"How secure are we?" That's one of the most common questions asked by boards and senior managers. But security and technology leaders do not always have ready answers, says Jacob Olcott of BitSight Technologies. Are they even using the right security metrics?
In an interview about cybersecurity metrics, Olcott...

While the rapid influx of smart devices, including tablets and phones, and mobility workforce trends is adding significant complexity to IT operations, the increase in employee productivity, collaboration, and satisfaction that mobile technologies offer is not lost on business leaders.
Healthcare technology leaders...

Learn how to shift the cybersecurity conversation with your BOD in order to get the budget you need to defend against today's modern attacks. It is time to get the reporting that you want and the security that you need.
Inside this eBook from DefenseStorm you'll learn:
How to talk about cybersecurity with the BOD...

One of the most difficult and endemic problems facing cybersecurity departments today is security's 'you don't know what you don't know syndrome.' All too often, information security practitioners
are tasked with responding to incidents on their network that they may not even know exist until they've already become...

This healthcare company is one of the leading medical information exchange service providers in the U.S. The company processes multiple billions of pieces of sensitive information annually. Each and every one of those medical records, prescription transactions and doctor/patient communications contains a protected...

A mid-sized energy cooperative drastically reduced incidence response times and moved from a reactive to a proactive security approach. This was due to the lean security staff who needed a solution to quickly identify, validate and investigate security alerts and to ensure compliance with electric power industry...

Television shows like CSI and NCIS have helped familiarize people with the use of genetic data to link a suspect to a crime with great assurance. While those shows are merely entertainment, the fact is that genetic data is now commonly used, not only in criminal investigations, but much more so in medical, biological...

A large travel and leisure company wasn't looking for another point solution to add to its already noisy security environment, so they were excited to find a solution that provided real-time and retrospective
threat intelligence, correlated observation analysis, and full packet capture - all wrapped in a beautiful...

Despite high-profile leaks and the attention given to the insider threat, many organizations still fail to even see that they have an insider threat problem. Ajit Sancheti, CEO of Preempt, discusses what's needed to improve insider threat detection.
It all starts with trust, Sancheti says. And sometimes, frankly, we...

Nearly half of organizations have been struck by ransomware in the past year, which is opening eyes to how ineffective traditional antivirus is at stopping modern attackers. As security teams begin evaluating next-gen antivirus (NGAV) products as a replacement, they need guidance. This checklist will help you assess...

Rather than dying, antivirus is actually growing up. Today, organizations look to spend their antivirus budget on replacing current solutions with next-generation antivirus (NGAV) platforms that can stop modern attacks, not just known malware. NGAV takes a system-centric view of endpoint security, examining every...

As cloud adoption in healthcare increases, many organizations grapple with understanding who is responsible for the confidentiality, integrity, and availability of protected health information (PHI) as it moves across the cloud supply chain. To help resolve any confusion, it is first important to review some...

While companies spend huge sums of money every year to maintain a security perimeter designed to fend off cyber and insider threats, daily reports of new data breaches are raising doubts about the effectiveness of these investments. One of the biggest challenges in cyber security today is how to manage the volume,...

Enterprises continue to find it a challenge to address vulnerabilities and susceptibilities to risk for the business on a wider scale. Although most enterprises employ a variety of cyber security tools and policies, many lack the visibility and cadence (or rhythm) to program and/or leverage a holistic organizational...

Adopting standardized best practices, as embodied here in Hitachi ID Identity Express, has a positive impact on Identity and Access Management (IAM) implementation and operation. IAM implementation using Identity Express is faster, costs less and incurs less risk since operation is optimized, incorporates rich...